A New Direction for Identity: Where Okta and Auth0 Come Together

The first time Okta CEO Todd McKinnon approached me about a merger in 2013, Auth0 was only five months old. I couldn’t believe it. With only two paying customers and a team not much bigger, Auth0 was just getting started. Okta, by contrast, was already a power player in the identity space. Its CEO’s interest in our tiny operation affirmed our…

Your Business Growth Depends on Customer Identity

A new era of business requires new methods for increasing revenue and accelerating business growth. The best way to do this? Leveraging modern technologies and tools. Providing customers with extraordinary digital experiences is more important than ever—and customer identity and access management (CIAM) is an essential component of this.  Today,…

Why Okta Forum21 is Europe’s leading Identity event

With 78% of customers in the EMEA stating they’d be unlikely to purchase from a company they did not trust,1 it’s easy to see why the topic is a major concern for many organisations today – but what does trust really mean for your customers, your employees, and your digital business? And how do you successfully secure trust when anxieties around…

Okta and AWS Partner to Secure EC2 Instances with the Okta Advanced Server Access Quick Start

Millions of companies – including many Okta customers – rely on Amazon Web Services (AWS) to power their businesses. According to 2020's Businesses@Work Report, AWS has risen steadily from sixth place five years ago to the second most popular cloud app used by Okta customers. As companies increasingly use AWS to power their infrastructure, they…

What Are the Benefits and Limitations of Multi-Cloud?

Organizations are increasingly deploying and implementing cloud services in an effort to reduce the cost and complexity of their infrastructure while accelerating their innovation levels. And this is typically a multi-pronged approach: 92% of enterprises have deployed a multi-cloud strategy, while 80% deploy a hybrid cloud strategy. The average…

What is Password Hashing and Salting?

Security is often not top of mind when creating customer-facing applications. But in a landscape of continual data breaches of major corporations like T-Mobile and Google, companies must be vigilant to adhere to security best practices. Processes like password salting and hashing are fundamental to the security posture of your apps. Understanding…

Archive

Follow Us
Share on Linkedin Share on Youtube